Search: For - Cyber

616 results found

No ‘sayonara’ for Japan in Indo-Pacific geopolitics
Apr 03, 2023

No ‘sayonara’ for Japan in Indo-Pacific geopolitics

A Japan that is deeply invested in Indo-Pacific stability and prosperity is reassuring

Nurturing Responsible Young Netizens through Digital Civics
Dec 05, 2022

Nurturing Responsible Young Netizens through Digital Civics

To ensure that the youth become effective ‘Digital Citizens’ of India, cybersecurity awareness focusing on digital civics and cyber hygiene needs

OCEN: क्रेडिट सिस्टम यानी ऋण देने की प्रक्रिया का डिजिटलीकरण!
Jan 04, 2023

OCEN: क्रेडिट सिस्टम यानी ऋण देने की प्रक्रिया का डिजिटलीकरण!

आने वाले वर्षों में OCEN ज़बरदस्त सफलता हासिल कर जन-जन तक नि�

Pakistan’s latest nuclear antics in the form of Full Spectrum Deterrence
Jul 24, 2023

Pakistan’s latest nuclear antics in the form of Full Spectrum Deterrence

Despite Pakistan’s deployment of a wide range of nuclear capabilities as part of its FSD strategy, there is no need for India to be alarmed

Paris plays spoiler on NATO’s deepening Indo-Pacific ambitions
Jul 27, 2023

Paris plays spoiler on NATO’s deepening Indo-Pacific ambitions

Despite plans for a Tokyo liaison office being on hold for now, NATO cooperation with the Indo-Pacific4 is likely to deepen

Pivotal regulatory considerations for #AIForAll
Jan 15, 2022

Pivotal regulatory considerations for #AIForAll

MeitY needs to spearhead the initiative to draft a suitable framework to regulate Artificial Intelligence by working closely with relevant stakeholder

Preventing proliferation: Tracking Uranium on the blockchain
Aug 20, 2023

Preventing proliferation: Tracking Uranium on the blockchain

Advances in technology, the shifting sands of the global nuclear energy market, and the extant standards and practices surrounding the monitoring of radioactive materials raise important questions about the future of nuclear security. Technological advancements have enabled the retrieval of radioactive materials from unconventional sources and made fuel fabrication easier. The emergence of new players in the nuclear energy market also flags conce

Privacy and security risks of digital payments
May 09, 2017

Privacy and security risks of digital payments

Digital financial services have benefits but pose privacy risks that harm consumers, merchants, markets, and nations alike. Some payments systems in India suffer from vulnerabilities because they were not prospectively designed on the basis of the ‘privacy by design’ principle. At the back-end, the centralised storage of data is risky. At the front-end, faulty capture devices enable data misuse. Across the middle mile, data is transmitted wit

Promoting Child Safety Online in the Time of COVID-19: The Indian and Australian Responses
Aug 14, 2023

Promoting Child Safety Online in the Time of COVID-19: The Indian and Australian Responses

Since the outbreak of the COVID-19 pandemic in early 2020, there has been a surge in cases of online child sexual abuse and exploitation (OCSAE) in many parts of the world. This brief discusses the cases of India and Australia. It examines their efforts to combat the increased incidence of OCSAE resulting from greater use of the internet as movement was restricted in response to the pandemic. The brief focuses on India and Australia as bo

Promoting Principles-Based Use of Technology in Humanitarian Assistance
Aug 16, 2023

Promoting Principles-Based Use of Technology in Humanitarian Assistance

The application of emerging technologies in humanitarian assistance has increased in recent years, and they have proven effective in delivering life-saving interventions to populations in need. In a fast-changing technological landscape, the use of such tools is only expected to increase further. At the same time, however, the use of technologies brings certain challenges, such as misuse of data and the spread of misinformation. This brie

Protecting enterprise secrets and intellectual property in a volatile world
Oct 24, 2020

Protecting enterprise secrets and intellectual property in a volatile world

As technology evolves and new solutions emerge, governments have taken greater interest in regulatory matters, particularly in Indo-Pacific economies

Protecting personal data: Who is the governor?
May 20, 2019

Protecting personal data: Who is the governor?

African countries should learn from mistakes that have already been made while pursuing their own path in Internet security.

Redefining multi-stakeholderism for internet
Nov 15, 2014

Redefining multi-stakeholderism for internet

Democratic multi-stakeholderism has the potential to mitigate the genuine concerns of sovereign nations in terms of protection of their cyber resources and infrastructure - not only from anonymous hackers and non-state actors, but also from the overarching surveillance mounted by the US and its allies.

Regulating AI in Public Health: Systems Challenges and Perspectives
Jul 27, 2020

Regulating AI in Public Health: Systems Challenges and Perspectives

Artificial Intelligence (AI) is increasingly proliferating the healthcare landscape and has immense promise for improving health outcomes in a resource-constrained setting like India. With emerging technology still finding its footing in the healthcare industry in the country, there are systemic roadblocks to hurdle before AI can be made transformative up to the last mile of public health. AI also carries immense challenges for India’s mostly t

Russia’s hybrid warfare strategy: From Crimea to Ukraine
Mar 01, 2022

Russia’s hybrid warfare strategy: From Crimea to Ukraine

Russia has perfected its use of hybrid warfare by developing new techniques against its adversaries over the years.

Secure ICT is impossible without trustworthy suppliers
Nov 10, 2021

Secure ICT is impossible without trustworthy suppliers

To navigate rising cybersecurity threats, Trust Centres are crucial in determining the level of trustworthiness of ICT vendors

Securing digital terrain
Mar 17, 2015

Securing digital terrain

The Sony hack is a textbook example of the fog of cyberwar. The whole incident is a telling manifestation of the many aspects of cybersecurity: the question of state behavior in cyberspace; the threat to business advancing public-private cooperation in combating such attacks; and the question of motive

Securing Two Oceans: Bolstering India-Australia Defence Cooperation in the Indo-Pacific
Jul 21, 2023

Securing Two Oceans: Bolstering India-Australia Defence Cooperation in the Indo-Pacific

Countries such as India and Australia are redefining their Indo-Pacific policies amidst the growing belligerence of China in the region. The two have a common interest in stability, while standing firmly against any militarisation. Their willingness to partner closely with like-minded countries in the Indo-Pacific lays the foundation for stronger defence and security cooperation between the two middle-power democracies and Indian Ocean li

Security compromised
Nov 07, 2019

Security compromised

India’s claims to being a legitimate power in cyberspace have come under doubt following two recent revelations

Security Nexus: ‘तक़नीक, जल और सुरक्षा का ताना बाना’
Jan 09, 2023

Security Nexus: ‘तक़नीक, जल और सुरक्षा का ताना बाना’

उभरती हुई टेक्नोलॉजी और चौथी औद्योगिक क्रांति, क्या भारत

Separation anxieties: US, China and tech interdependence
Apr 09, 2020

Separation anxieties: US, China and tech interdependence

In the near future, we will likely see the United States supplement domestic mechanisms to decouple from China — with systematic escalation — at k

Sino Techno-Nationalism Powers Through With ‘China Manufacturing 2025’
Jun 09, 2021

Sino Techno-Nationalism Powers Through With ‘China Manufacturing 2025’

Despite being the ‘factory of the world,’ many of China’s industrial sectors are energy-intensive and have low value-add. At the same time, global firms are increasingly moving towards sophisticated low-cost manufacturing techniques for higher productivity gains. As a result, the Chinese Communist Party is keen to upgrade the country’s industrial base to compete in the more advanced segments, such as information technology, through the �

Snowden effect
Jun 25, 2013

Snowden effect

It is not often that China defends the rights of whistleblowers against the state and America finds itself defensive about internet freedom. That precisely is what Edward Snowden, the young American who has exposed the expansive cyber espionage activities of the National Security Agency in the United States against its own citizens and the rest of the world, has achieved.

Social Media and Political Leaders: An Exploratory Analysis
Jul 21, 2023

Social Media and Political Leaders: An Exploratory Analysis

Politicians have always used the media to communicate with the electorate. What makes social media unique is the scale, speed, and minimal cost at which leaders can do this task. This paper analyses the relationship between political leaders and the microblogging site, Twitter. It provides a comprehensive and systematic analysis of the use of Twitter by two contemporary Indian political leaders—Narendra Modi and Rahul Gandhi. It describ

Sovereignty in a ‘Datafied’ World
Oct 18, 2021

Sovereignty in a ‘Datafied’ World

Global data governance is at a crossroads—intensely contested by nations and industry players seeking to shape rules of the road to benefit their strategic interests. India has placed itself at the heart of the battle, its foreign policy vision fuelled by the principle of ‘data sovereignty’—a broad notion that supports the assertion of sovereign writ over data generated by citizens within a country’s physical boundaries. While this visi

Starlink and Ukrainian military performance: Implications for India
Jun 02, 2022

Starlink and Ukrainian military performance: Implications for India

How has Elon Musk's Starlink Satellite Network played an important role in strengthening the Ukrainian military's might?

Strengthening the Online Education Ecosystem in India
Nov 18, 2020

Strengthening the Online Education Ecosystem in India

The COVID-19 pandemic has disrupted the formal schooling system in India, as it has across the globe, causing massive pressure on the online education sector. This paper analyses the state of digitalised education in India. It outlines current government guidelines on digital-mode schooling, and uses the case of Maharashtra’s five-year-old efforts at digitalising government schools to gauge preparedness for implementing the guidelines. It highl

String of ports
Apr 11, 2014

String of ports

While India is looking to the UN to manage the cyber challenges, America and China are exploring bilateral solutions that could eventually be imposed on the rest of the world. That is very similar to what happened in the nuclear arena five decades ago.

Sustainable semiconductor: भारत के लिए टिकाऊ सेमीकंडक्टर हासिल करने का मिशन!
Jul 26, 2023

Sustainable semiconductor: भारत के लिए टिकाऊ सेमीकंडक्टर हासिल करने का मिशन!

अब जबकि भारत सेमीकंडक्टर का अगला बड़ा केंद्र बनने की दिश�

Tackling Pakistan’s anti-India security strategy
Feb 04, 2022

Tackling Pakistan’s anti-India security strategy

A thaw in the India-Pakistan relations remains highly unlikely if Pakistan continues to back anti-India policies

Tech becomes CCP’s new frontier for spreading its influence
Dec 27, 2021

Tech becomes CCP’s new frontier for spreading its influence

CCP’s control over social media continues to expand as it aims to control the global narrative and present a favourable image to the world.

Tech collaboration between democracies
Sep 15, 2022

Tech collaboration between democracies

Given the rapid advances made by authoritarian regimes in the tech space, democracies must work together to promote collective technology leadership.

Tech-driven counterterrorism: Navigating new frontiers
Mar 29, 2024

Tech-driven counterterrorism: Navigating new frontiers

There is a growing need for adaptive counter-terrorism strategies and global collaboration to navigate the intersection of technology and terrorism ef

Technology policymaking in India: The need for a paradigm shift
Jan 15, 2022

Technology policymaking in India: The need for a paradigm shift

To emerge as tech power in the future, India needs to rethink its approach towards policymaking

Terrorist Resources, Proclivity for Attacks, and an Effective Counterterrorism Framework
Jul 17, 2023

Terrorist Resources, Proclivity for Attacks, and an Effective Counterterrorism Framework

This paper proposes a counter-terrorism (CT) framework in terms of three types of CT policies—i.e., offensive, defensive, and confidence-building measures (CBMs)— targeted at a terror outfit that is either resource-constrained or resource-abundant. It argues that defensive measures are a ubiquitous element of CT, as these can prove effective irrespective of whether the targeted terrorist group is resource-abundant or resource-constrained. On